Synopsys Security Webinar 800x100 High Quality (2)
WP_Term Object
(
    [term_id] => 95
    [name] => Automotive
    [slug] => automotive
    [term_group] => 0
    [term_taxonomy_id] => 95
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 761
    [filter] => raw
    [cat_ID] => 95
    [category_count] => 761
    [category_description] => 
    [cat_name] => Automotive
    [category_nicename] => automotive
    [category_parent] => 0
    [is_post] => 
)

2015’s Unfinished Automotive Business

2015’s Unfinished Automotive Business
by Roger C. Lanctot on 01-02-2016 at 4:00 pm

The farther we come, the farther we have to go. While progress in advancing personal transportation was made in 2015, the year closes with glaring elements of unfinished business threatening to impede further progress toward mitigating highway fatalities and reducing emissions and congestion. These areas of unfinished business… Read More


Big Auto Fearing IoT!!

Big Auto Fearing IoT!!
by Al Gharakhanian on 12-28-2015 at 7:00 am

In my advisory role I routinely interact with many customers and IoT thought leaders and invariably get acquainted with their point of views. I find most of these insights unique, informative, and most interestingly unmentioned in major news outlets. My intention for posting this is to share some of these findings with you.

YetRead More


Self-driving Connected Taxis Insights from Patents

Self-driving Connected Taxis Insights from Patents
by Alex G. Lee on 12-26-2015 at 4:00 pm

Japanese company Robot Taxi Inc. announced that it will start trials with self-driving taxi service beginning in 2016. US20150339928 illustrates the system for operating the autonomous vehicles taxi service. A user can request a taxi service using an application that is running on the user’s mobile device. The taxi service… Read More


DSP gives Project Tango a power dip

DSP gives Project Tango a power dip
by Don Dingee on 12-24-2015 at 12:00 pm

Google’s Project Tango is a prime example of a sophisticated application pushing the boundaries of what is possible within the power envelope of a mobile device. Its objective is to combine 3D motion tracking with depth sensing to understand how a device is moving and gauge its surroundings precisely.… Read More


Auto Introspection

Auto Introspection
by Bernard Murphy on 12-20-2015 at 4:00 pm

It is an indictment of our irrationality that our cars are now more health-conscious than we are. Increasingly safety-conscious readings of the ISO26262 standard now encourage that safety-critical electronics (anti-lock braking control for example) automatically self-test, not just at power-on but repeatedly as the car… Read More


Is That My Car on Fire?

Is That My Car on Fire?
by Daniel Payne on 12-14-2015 at 7:00 am

I was kind of shocked when the service manager at our local VW dealership told me that one of the wires in the ignition system of my wife’s New Beetle had started to overheat, melting the insulation and becoming a safety hazard. Why didn’t a fuze just blow, protecting the wiring from overheating? We decided to quickly … Read More


3 flavors of TMR for FPGA protection

3 flavors of TMR for FPGA protection
by Don Dingee on 12-10-2015 at 4:00 pm

Back in the microprocessor stone age, government procurement agencies fell in love with the idea of radiation hardened parts that might survive catastrophic events. In those days, before rad-hard versions of PowerPC and SPARC arrived, there were few choices for processors in defense and space programs.

One of the first rad-hard… Read More


Auto ISAC—What is it and do we need one?

Auto ISAC—What is it and do we need one?
by Chan Lieu on 12-03-2015 at 12:00 pm

An Information Sharing and Analysis Center (ISAC) is essentially a trusted entity established by critical infrastructure owners and operators to share threat data. ISACs first emerged in 1998 when President Clinton issued Presidential Decision Directive 63, which identified the nation’s critical infrastructure that could… Read More


Automobiles and the DMCA

Automobiles and the DMCA
by Chan Lieu on 11-09-2015 at 12:00 pm

When you drive a car off the dealer’s lot, you own the whole vehicle, right? For decades, car owners have popped the hood and crawled under the car to do their own maintenance; and for those mechanically inclined, even make modifications to improve performance or handling. However, in an era where a car is increasingly controlled… Read More


To err is runtime; to manage, NoC

To err is runtime; to manage, NoC
by Don Dingee on 10-27-2015 at 12:00 pm

Software abstraction is a huge benefit of a network-on-chip (NoC), but with flexibility comes the potential for runtime errors. Improper addresses and illegal commands can generate unexpected behavior. Timeouts can occur on congested paths. Security violations can arise from oblivious or malicious access attempts.

Runtime… Read More